CN111460536B - Password verification method and device, storage medium and electronic equipment - Google Patents

Password verification method and device, storage medium and electronic equipment Download PDF

Info

Publication number
CN111460536B
CN111460536B CN202010235535.2A CN202010235535A CN111460536B CN 111460536 B CN111460536 B CN 111460536B CN 202010235535 A CN202010235535 A CN 202010235535A CN 111460536 B CN111460536 B CN 111460536B
Authority
CN
China
Prior art keywords
password
user
passwords
displayed
bit
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010235535.2A
Other languages
Chinese (zh)
Other versions
CN111460536A (en
Inventor
李雨柔
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN202010235535.2A priority Critical patent/CN111460536B/en
Publication of CN111460536A publication Critical patent/CN111460536A/en
Application granted granted Critical
Publication of CN111460536B publication Critical patent/CN111460536B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/84Protecting input, output or interconnection devices output devices, e.g. displays or monitors
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation

Abstract

The application relates to the computer technology, and provides a password verification method, a device, a storage medium and electronic equipment, which utilize a multi-dimensional password and a multi-dimensional keyboard to improve the password decoding difficulty, thereby improving the password security, and particularly playing a good role in preventing the password from being peeped. According to the application, a multi-dimensional keyboard is utilized to display a plurality of passwords on each key, when a user sets and uses the passwords, L key inputs are selected through the multi-dimensional keyboard according to the number L of the passwords, and a plurality of password information is input each time, and the combination mode among the L-bit plurality of information is quite large, so that the password decoding difficulty is increased, and the password security is improved.

Description

Password verification method and device, storage medium and electronic equipment
Technical Field
The application relates to the technical field of computers, in particular to a password security technology, and provides a password verification method and device.
Background
The password technology is an important means for realizing information security, is widely used in various businesses needing identity authentication, and according to the password input by the corresponding user identifier, the system compares the verification password stored by the corresponding user information to confirm whether the user is a legal user or not, and further determines the authority of the user.
Since in many applications, the password needs to be input in public places, how to prevent the password from being peeped and to increase the difficulty of decoding the password is a security problem. The age and knowledge structure of the password user group are wide, and the convenience of password use is also a problem to be considered. Therefore, it has been a subject of password research to provide a more simple and effective password security technique.
Disclosure of Invention
The embodiment of the application provides a password verification method, a device, a storage medium and electronic equipment, which utilize a multi-dimensional password and a multi-dimensional keyboard to improve the password decoding difficulty, so that the password security is improved, and particularly, the password verification method and the device play a good role in preventing the password from being peeped.
In a first aspect, an embodiment of the present application provides a password verification method, including:
responding to password input operation of a user, and obtaining L keys selected by the user on a multi-dimensional keyboard and a selection sequence, wherein the multi-dimensional keyboard comprises N keys, the multi-dimensional passwords comprise passwords of M dimensions, each dimension comprises at most K passwords, at least one password is displayed on each key, and when the multi-dimensional keyboard is displayed at least twice continuously, at most one password in the multi-dimensional passwords displayed on any two keys is the same;
Respectively obtaining a password set displayed on each key of the L keys, and forming an L-bit password set sequence after the password sets are arranged according to the selection sequence, wherein each bit password set comprises at least one check password, and both N, M, K and L are positive integers;
and obtaining a password verification result and executing corresponding operation according to the password verification result, wherein when each reference password in the L-bit reference passwords is contained in a password set corresponding to the sequence of the L-bit password sets, the verification result is successful, and the L-bit reference passwords are preset by a user through the multidimensional keyboard.
The application uses multi-dimension cipher and combines the dynamic display technology of multi-dimension keyboard, each time of input display interface is different, so that the possible cipher combination is (M.times.K) when each time of input L A kind of module is assembled in the module and the module is assembled in the module. The input display interfaces are different each time, so that the password decoding difficulty is higher. Even if the password is maliciously snooped by others, the password is difficult to decipher, and information leakage and property loss are avoided.
In one specific embodiment, L keys selected by a user on the multi-dimensional keyboard and a selection sequence are obtained at least twice;
Respectively obtaining corresponding L-bit password set sequences; and
and when each password in the L-bit reference passwords is contained in the password sets which are sequenced and correspond to the at least two L-bit password set sequences, the verification result is successful.
According to the embodiment of the application, the L-bit password set sequence obtained by at least two inputs can be used for obtaining the L-bit check password input by the user, each check password is the intersection of the corresponding password sets ordered in the at least two L-bit password set sequences, and when the L-bit check password is the same as the L-bit reference password, the check result is successful.
Based on the password verification mode, a mode of setting the L-bit reference password by the user through the multi-dimensional keyboard in advance specifically comprises the following steps:
responding to the reference password setting operation of a user, and displaying the multi-dimensional keyboard at least twice, wherein: at most one identical code is displayed in the multidimensional codes displayed on the same key between any two of the at least two times;
according to the password setting operation performed by the user on the multi-dimensional keyboard displayed at least twice, obtaining L-bit reference passwords set by the user, wherein each reference password in the L-bit reference passwords is an intersection of password sets displayed on keys which are sequenced to be the same in the at least two password setting operations.
In a specific embodiment, each dimension includes N passwords, and each password of each dimension is displayed on a different key when the multi-dimensional keyboard is displayed each time, where M is less than or equal to N, and K is less than or equal to N.
According to the reference password setting mode, a user needs to perform password setting operation twice, if the reference password needs to be further confirmed, the password setting operation can be performed once again, the reference password is acquired through the first input and the second input, the reference password is acquired again through the first input and the third input, and whether the reference passwords acquired twice are the same is judged. The second time the reference password is acquired, the second time and the third time the reference password is input may be used. If the reference password cannot be obtained after a certain input error, the user can be prompted to input again.
Based on the above password verification method, the other method for setting the L-bit reference password by the user through the multidimensional keyboard in advance specifically includes:
responding to the reference password setting operation of a user, displaying the multi-dimensional keyboard, and displaying dimension selection information corresponding to each reference password input operation;
and recording the corresponding dimension password in the passwords displayed by the keys selected by the user as the reference password set by the user according to the dimension information selected by the user when the user inputs each bit of reference password.
According to the reference password setting mode, a user can perform one-time password setting operation, if the reference password needs to be further confirmed, the password setting operation can be performed again, whether the reference passwords acquired by the first input and the second input are the same or not is judged, and if the reference passwords are not the same, the user can be prompted to input again.
For better compatibility with a single-dimensional numeric keypad, the N is equal to 10, the M dimensions include a numeric dimension, the numeric dimension includes 10 digits, and the 10 digits are integers greater than or equal to 0 and less than or equal to 9.
The embodiment of the application also provides a dynamic display technology of the multi-dimensional keyboard, wherein when the multi-dimensional keyboard is displayed each time, at most one of the multi-dimensional passwords displayed on any two keys is the same, and the technology specifically comprises the following steps:
when each time of display, based on the passwords of each dimension displayed on the N keys at the last time, keeping the password of any dimension displayed on the N keys unchanged;
and moving at least one key for displaying in a mode of keeping the ordering unchanged for the passwords displayed on each key in each dimension except any dimension, wherein the numbers of the keys correspondingly moved in each dimension are different. The display positions of the N keys may be rearranged each time they are displayed.
In another aspect of the present application, there is also provided a password verification apparatus, including:
the first response unit is used for responding to the password input operation of a user and obtaining L keys selected by the user on the multi-dimensional keyboard and a selection sequence, wherein the multi-dimensional keyboard comprises N keys, the multi-dimensional password comprises passwords of M dimensions, each dimension comprises at most K passwords, at least one password is displayed on each key, and when the multi-dimensional keyboard is displayed at least twice continuously, at most one password in the multi-dimensional passwords displayed on any two keys is the same;
the first obtaining unit is used for respectively obtaining a password set displayed on each key of the L keys, and forming an L-bit password set sequence after being arranged according to the selection sequence, wherein each bit password set comprises at least one check password, and the N, M, K and the L are positive integers;
and the verification unit is used for obtaining a password verification result and executing corresponding operation according to the password verification result, wherein when each reference password in the L-bit reference passwords is contained in the password set corresponding to the ordering in the L-bit password set sequence, the verification result is successful, and the L-bit reference passwords are preset by a user through the multidimensional keyboard.
The first response unit is specifically configured to obtain, at least twice, L keys and a selection sequence selected by a user on the multi-dimensional keyboard;
the first obtaining unit is specifically configured to obtain an L-bit password set sequence corresponding to each time; and
the verification unit is specifically further configured to, when each password in the L-bit reference password is included in the password set corresponding to the sequence of each L-bit password set, successfully verify the result.
The verification unit is specifically further configured to obtain an L-bit verification password input by the user according to the L-bit password set sequence obtained by at least two inputs, where each of the L-bit verification passwords is an intersection of corresponding password sets ordered in the L-bit password set sequence at least two times, and when the L-bit verification password is the same as the L-bit reference password, the verification result is successful.
In the embodiment of obtaining the reference password according to the password setting operation performed by the user at least twice, the verification apparatus may further include:
the second response unit is used for responding to the reference password setting operation of the user and displaying the multi-dimensional keyboard at least twice, wherein: at most one identical code is displayed in the multidimensional codes displayed on the same key between any two of the at least two times;
The second obtaining unit is used for obtaining L-bit reference passwords set by the user according to the password setting operation performed by the user on the multi-dimensional keyboard displayed at least twice, wherein each reference password in the L-bit reference passwords is an intersection of password sets displayed on keys which are sequenced to be the same in the at least two password setting operations.
When each dimension comprises N passwords, each password of each dimension is displayed on different keys respectively when the multi-dimension keyboard is displayed each time, M is smaller than or equal to N, and K is smaller than or equal to N. In this display mode, the user can select the password dimension at the time of setting each bit of the reference password, and the reference password can be set by one password setting operation.
Based on the display mode of the multi-dimensional keyboard, according to the one-time password setting operation of the user, in the embodiment of obtaining the reference password, the verification device may further include:
the second response unit is used for responding to the reference password setting operation of the user, displaying the multi-dimensional keyboard and displaying dimension selection information corresponding to each bit of reference password input operation;
and the second obtaining unit records the corresponding dimension password in the passwords displayed by the keys selected by the user as the reference password set by the user according to the dimension information selected by the user when each bit of reference password is input.
In the above various embodiments, for compatibility with a single-dimension digital code, the N is equal to 10, the M dimensions include digital dimensions, the digital dimensions include 10 digits, and the 10 digits are integers greater than or equal to 0 and less than or equal to 9.
When the multi-dimensional keyboard is displayed, the first response unit or the second response unit is specifically used for keeping the password of any dimension displayed on the N keys unchanged based on the passwords of each dimension displayed on the N keys last time during each display; and moving at least one key for displaying in a mode of keeping the ordering unchanged for the passwords displayed on each key in each dimension except any dimension, wherein the numbers of the keys correspondingly moved in each dimension are different.
In yet another aspect of the present application, a computer readable storage medium is provided, the computer readable storage medium storing computer instructions that when executed by a processor implement any one of the foregoing cryptographic verification methods.
In yet another aspect of the present application, an electronic device is provided that includes a memory, a processor, and a computer program stored on the memory and executable on the processor, the processor implementing any one of the foregoing password verification methods when executing the program.
Due to the adoption of the technical scheme, the embodiment of the application has at least the following technical effects:
the input mode of the keyboard is exactly the same as the input method of the existing keyboard, and a user only needs to press a position to select key input according to a preset multi-dimensional password. The user does not need to memorize a complex input method or judge a subsequent input method in a mode of vibration of the mobile phone and the like.
Moreover, the embodiment of the application can be conveniently realized in the existing password input and verification system, only the keyboard input display interface is required to be modified, the password content recorded by the password in the original system is changed from a pure digital password into a multi-dimensional password form, and the password verification mode is similar to the verification mode of a common digital password. Therefore, the password input device has wide application scenes and can be applied to password input of mobile phones, POS machines, computers, servers, bank ATM machines, intelligent door locks, digital mobile terminals and other devices.
Drawings
FIG. 1 is a schematic diagram of a related art single-dimensional keyboard composed of 10 number keys;
fig. 2a, fig. 2b, and fig. 2c are schematic diagrams of a multi-dimensional keyboard displaying a multi-dimensional password according to an embodiment of the present application;
fig. 3a and fig. 3b are schematic diagrams of a four-dimensional keyboard displaying a four-dimensional password according to an embodiment of the present application;
FIG. 3c is a diagram illustrating the correspondence among dimensions, passwords and eigenvalues of a four-dimensional password according to an embodiment of the present application
FIG. 4a is a schematic diagram of a conventional display of each key of a multi-dimensional keyboard according to an embodiment of the present application when a numeric password is used as a reference;
FIG. 4b is a schematic diagram showing the disordered display of each key in the multi-dimensional keyboard according to the embodiment of the application when the digital password is used as a reference;
fig. 5 is a schematic diagram of an application scenario architecture according to an embodiment of the present application;
FIG. 6a is a schematic diagram of a multi-dimensional password setup procedure according to an embodiment of the present application;
fig. 6b, fig. 6c, and fig. 6d are schematic views of an operation interface of a user when setting a multi-dimensional password in an embodiment of the present application;
FIG. 6e is a schematic diagram of key selection and password correspondence when a user sets a multi-dimensional password in an embodiment of the present application;
FIG. 6f is a schematic diagram of obtaining a reference password from an intersection of a set of passwords displayed on each of the corresponding ordered keys according to two password setting operations by a user in an embodiment of the application;
FIG. 7a is a schematic diagram of a password verification process of a multi-dimensional password according to an embodiment of the present application;
FIG. 7b is a schematic diagram of an operation interface of a user when inputting a multi-dimensional password according to an embodiment of the present application;
FIG. 8 is a block diagram of a password checking device according to an embodiment of the present application;
fig. 9 is a schematic structural diagram of a computer electronic device to which the password verification method provided by the embodiment of the application is applied.
Detailed Description
In order to better understand the technical solutions provided by the embodiments of the present application, the following detailed description will be given with reference to the accompanying drawings and specific embodiments.
The information carried on each key in the traditional keyboard is generally in a single dimension, taking the traditional full keyboard as an example, each key generally corresponds to information in a single dimension, such as numbers or letters, when the information is input by using the single-dimension keyboard, the corresponding relation between each input operation and the input information is very clear, and the input information can be clearly known by peeping the input operation. Even if information in two dimensions is carried on an individual key, special control keys are required to be matched for operation during input, for example, numbers and operators on a full keyboard are usually arranged on one key, but when information is input by using the key, shift keys are required to be matched, so that which information to be input can be clearly displayed. In the case of inputting a password using a mobile terminal device such as a mobile phone, the keypad setting for inputting the password is simpler, and is generally composed of 10 number keys of 0 to 9, as shown in fig. 1. Assuming that the user uses the mobile phone to sequentially input each number constituting the password on the password authentication interface, the bystander only needs to see the whole input process, the password input by the user can be easily known, or the password input by the user can be easily and secretly photographed by adopting a candid photographing technology. Therefore, it is required to improve the security of the password, and even if a bystander intentionally observes or even records the video, the password can still be input in public without causing information leakage.
In order to improve the security of the password, the application provides a technology for performing password verification by using a multi-dimensional password, and in order to facilitate understanding of the technical scheme of the application, a plurality of technical improvement points provided by the application are firstly introduced in detail.
1. Multi-dimensional keyboard and multi-dimensional password
A multi-dimensional password is a password that constitutes a password, not a single dimension, but a combination of dimensions, a single dimension password is common, for example, a digital password, and the digital password may include multiple digits, for example, 6 digits or 8 digits, and is arranged according to a set order, where the password is verified successfully when the size and the ordering of each digit are correct. The multi-dimensional password is expanded on the basis of a single-dimensional password, the elements used as the password can be mixed passwords with different dimensions, the existing common passwords such as mixed numbers and letters are also common two-dimensional passwords with mixed numbers and letters, the common full-keyboard input is generally adopted, a unique password is correspondingly input when a key is selected each time, the password can still be easily observed, and no improvement is caused in the aspect of peeping prevention.
Along with the development of digital technology, mobile terminal devices generally use a touch-controlled digital keyboard as a password input keyboard, multiple pieces of information can be displayed on the digital keyboard at the same time, and the displayed multiple pieces of information are flexibly transformed according to set display rules. On the basis of the embodiment of the application, a multi-dimensional keyboard is provided, and a plurality of dimensions are arranged on each keyboard to be used as information of a password, for example, numbers, letters and colors can be displayed on the same key at the same time, for example, as shown in fig. 2 a. The dimensions displayed on each key may be single or multi-dimensional, such as shown in fig. 2B, with the keys displaying the number 0 being single-dimensional, the keys displaying the number 2 and the letter B being two-dimensional, etc. The password dimensions may be selected from a variety of forms, and in order to increase the difficulty of preventing peeping, some of the password dimensions may be displayed in a particular mode, for example, the color dimension may be displayed using a corresponding color. On this basis, the passwords with some dimensions can be displayed in a combined mode, for example, as shown in fig. 2c, after the colors and the graphics are combined, the colors are not displayed in the form of Chinese characters, but are displayed in the form of background colors in the graphics, in fig. 2c, the background colors in the graphics circles are orange colors which represent orange passwords in the color dimension, the background colors in the triangles can be yellow which represent yellow passwords in the color dimension, and the like, and one background color is added in the graphics passwords on other keys to represent the corresponding color passwords. Each digit can be displayed in a different color on a digit basis, and represents a password of the digit color dimension. The above-mentioned dimensions include a digital dimension, a digital color dimension, a graphic dimension, a background color dimension, etc., but may be any other dimension commonly used, such as various pets, fruits, etc. The password formed by the multi-dimensional information is called a multi-dimensional password, and the keyboard displaying the multi-dimensional password forms a multi-dimensional keyboard. The specific display mode adopted by the password of each dimension can be varied, and the application is not limited.
Because a plurality of passwords are displayed on each key, bystanders can know the key selected by the user, and can not determine the dimension of the password input by the user, so that the security of the password input is greatly improved, the password decoding difficulty is also greatly improved, and the password decoding is difficult under the condition of no peeping. Taking three-dimensional password as an example, referring to fig. 2c, as an example of three-dimensional password displayed on a mobile phone terminal, three dimensions may include a number dimension, a graphic dimension and a color dimension, wherein the password of the number dimension is 10 integer numbers of 0 to 9, the password of the graphic dimension includes 10 graphics, such as a circle, a triangle star, a trapezoid, a square, a semicircle, a heart, a pentagon, a regular hexagon, an star of star and a hexagon, the color dimension includes 10 colors, and the 10 colors are respectively displayed in a pattern of background colors of the graphics, such as orange, yellow, green, lake green, light pink, red, deep blue, purple, deep pink and gray. The number of passwords in each dimension is the same as the number of keys, the passwords are respectively displayed on one key, and the number of the passwords displayed on each key is 3.
Referring to fig. 2a, fig. 2b and fig. 2c, the multi-dimensional password keyboard provided by the application can be obtained by expanding the existing single-dimensional number password keyboard, and each key can represent a number password as well as any other password in any dimension. Therefore, the keyboard can be used as a common single-dimensional digital code keyboard, can also be used as a multi-dimensional code keyboard with two dimensions and even higher dimensions, is compatible with the existing digital code keyboard, and has a very simple operation mode. When the number of the password digits is the same, each dimension is increased to enable possible password combinations to be increased in geometric progression, so that the difficulty of password decoding is increased, and the peeping prevention effect is achieved.
It should be noted that the multi-dimensional keyboard shown in fig. 2a, 2b and 2c is only an example, and the present application is not limited to the number of keys of the multi-dimensional keyboard and the arrangement of the keys. For example, the multi-dimensional keyboard comprises N keys, the multi-dimensional password comprises M-dimensional passwords, each dimension comprises at most K passwords, and at least one password is displayed on each key. If K is equal to N, the number of passwords displayed on each key is M.
The principle of the multi-dimensional cipher keyboard provided by the application in the cipher using process is further described below by taking a four-dimensional keyboard as an example.
As shown in FIG. 3a, the number of keys N and the number of passwords K in each dimension are equal to 10, the number of the dimensions M is equal to 4, and the multi-dimension password shown in FIG. 3a is based on the three-dimension password shown in FIG. 2c, and a fourth dimension is added: the number color dimension forms a four-dimensional password, and the keyboard correspondingly displaying the four-dimensional password is called a four-dimensional keyboard, wherein the four-dimensional keyboard comprises 10 keys in total, and 4 passwords with different dimensions are distributed on each key. In fig. 3c, a feature value is also set for each password, and the transmission of the password checksum password information is performed by using the feature value corresponding to the password, which is described in detail in the following specific embodiments.
One display mode of the four-dimensional password is shown in fig. 3a, wherein the background color is displayed in the graph, and the digital color is used for displaying the digital mark in different colors. For example: the number 1, the gray number, the triangle and the background red are displayed on one key; the number 3, purple number, pentagon, background yellow is displayed on one key; number 5, red number, hexagram, background green on one key, etc.
Referring to fig. 3a, assume that the scenario: the user uses the four-dimensional keyboard provided by the embodiment of the application to sequentially select the following 6 keys: number 3 key-number 5 key-number 1 key-number 8 key-number 2 key-number 7 key. Depending on the order of selection of the keys, a group of passwords entered through a multi-dimensional keyboard may be combined in a number of ways, up to 4 possible combinations of passwords 6 I.e., 4096, the combination of passwords is nearly 4000, even though the possibility that the same color number is displayed on the same or similar background color is eliminated. The possible combinations can be either single-dimensional passwords or multi-dimensional hybrid passwords. A one-dimensional password is, for example, a password that is entirely composed of numbers: '3, 5, 1, 8, 2, 7', multi-dimensional passwords such as: '3, background red, graphic triangle, 8, 2, 7', 'graphic pentagon, 5, 1, graphic trapezoid, background orange, 7', or 'background yellow, background cyan, background red, background powder, background orange, background violet', etc. For a five-dimensional or higher-dimensional keyboard, the combination forms of the passwords are more and are difficult to decipher, so that the purpose of preventing the passwords from being peeped and leaked is achieved.
The example of each multi-dimensional keyboard is that passwords of other dimensions are added on the basis of a single-dimensional digital password keyboard, the numbers of passwords of each other element are 10, the passwords of each dimension are respectively displayed on different keys, the passwords displayed on the same key are respectively of different dimensions, and the numbers of the passwords displayed on each key are the same. However, it should be noted that, in the multi-dimensional password provided by the embodiment of the present application, the number of passwords in each dimension may be different, and it is not limited that each password displayed on the same key belongs to different dimensions. For example, in a three-dimensional password, the number dimension is 10 passwords, the number of the color dimension is only 8, and the number of the figure dimension is only 5. In this case, at least 1 password is displayed on each key. If the passwords defining each dimension can only be displayed on different keys respectively, a maximum of 3 passwords are displayed on one key. Of course, the same mode of the number of passwords displayed by all keys can be adopted, and passwords with some dimensions can be displayed twice. For example, 5 passwords in the graphic dimension, each password can be displayed on two keys at the same time when displayed each time, and two passwords in 8 passwords in the color dimension can be displayed on two keys at the same time.
2. Dynamic display of multi-dimensional keyboards
Because the multi-dimensional keyboard provided by the application comprises one or more passwords displayed on each key, when the passwords are input, the passwords input by a user cannot be uniquely determined through one operation. The embodiment of the application provides a dynamic keyboard display technology, wherein a dynamic adjustment algorithm is adopted, in all keys of a multi-dimensional keyboard displayed twice, at most one password is the same in passwords displayed on any two keys, the passwords displayed on any two keys displayed at the same time do not have the same password, and only one intersection is allowed at most in passwords displayed on two keys at different times. Thus, the user selects a plurality of keys each time according to the number of digits of the passwords, and the intersection of the passwords displayed on the same ordered key is only contained in one password according to the selection order. And then, through twice input, the passwords displayed on the two keys with the same sequence in the twice selection sequence are intersected, so that the unique password corresponding to each sequence can be obtained, and after the obtained passwords are combined according to the sequence, the password input by the user can be obtained. For example, as shown in fig. 3a and 3b, an example of two consecutive displays of a four-dimensional code keyboard is shown, in which the background color, the number color, and the graphic displayed on two keys with the same number are different.
In the embodiment of the application, if the keys selected by the multi-dimensional keyboard are used twice, a unique password can be obtained for each key with the same sequence, so that the accuracy of inputting the password by the user is ensured to a great extent, and further verification is not needed. Of course, to further ensure security, a third input may be performed, and the password input by the user may be obtained again by the third input and the first input, or the password input by the user may be obtained again by the second input and the third input, and the previously obtained password may be verified.
For example, with a four-dimensional 6-bit password, when the user enters the password for the first time, the password displayed on the first selected key comprises: 'graphic pentagon, 5, background orange, digital color red', when the user inputs the password for the second time, the password displayed on the first selected key comprises: 'graphic triangle, 7, background green, digital color red', then among the passwords entered by the user, the password ordered first is the intersection of the two: the digital color is red.
When the keyboard is displayed by adopting the dynamic keyboard technology, the displayed passwords on each key are adjusted when the multidimensional keyboard is displayed each time, so that the requirement of at most one same password is met, the display positions of each key can be disturbed, and the sight of a peeper is further disturbed. The display position of each key can be flexibly set according to the display screen and the requirement of the page interface, for example, the mobile phone terminal mode shown in fig. 4a comprises 10 keys which are divided into four rows, 3 keys are respectively arranged in the first three rows, and the last key is arranged in the middle of the fourth row. If the display mode shown in fig. 4a is referred to as a regular display, based on the ordering of the number codes, then fig. 4b is an example of an out-of-order display mode. In the conventional display mode of fig. 4a, the display positions of 10 number ciphers 0 to 9 in the number dimension are arranged sequentially from left to right in each row. In the out-of-order display mode shown in fig. 4b, the display positions of the respective digital passwords are disturbed, and the degree of disturbance of the out-of-order display mode is greater, so that the security is higher. The disorder is illustrated by taking a common single-dimensional digital password as an example, and the password display position of any one dimension can be used as a discrimination reference of a conventional mode and a disorder mode after other dimensions are added.
In the embodiment of the application, when a user sets a password or uses the password, the user inputs the password by adopting a multi-dimensional keyboard, the process of inputting the password is the process of selecting keys on the multi-dimensional keyboard, because a plurality of passwords are displayed on each selected key, when the user inputs the password each time, a group of password collection sequences are actually input, for example, the user sets L-bit reference passwords, L keys are required to be selected each time when the password is checked and input, the password collection displayed on the L keys is combined according to the key selection sequence to form an L-bit password collection sequence, and each password collection is contained in at least one check password. For example, if the first reference code of the L-bit reference code set by the user is the number 5, when the user inputs the check code, the code displayed on the first selected key includes the number 5, and if the first check code is correctly input, and if all the L-bit check codes are correctly input, the code check is successful.
The user also needs at least two setting operations to determine the reference password set by the user when setting the reference password. It is also possible to determine what the password is in particular for each bit of the verification password by performing the password input operation at least twice when the verification password is input. Therefore, in order to determine that each of the check passwords inputted by the user is unique through at least two operations, any two passwords displayed on the same key of the multi-dimensional keyboard are at most the same, so that the unique password can be determined according to the intersection of the two inputs. It should be noted that, at least two times herein generally refers to a process of performing verification by using a verification password and setting a password in a single business process. Of course, between adjacent business processes on the same terminal, the passwords displayed on the same key at any two times are kept to be the same as much as possible, so that peeping is further prevented.
The process of setting the reference password before the service is used by the user is basically the same as the process of inputting the check password by the user in the service use, and the dynamic display technology of the multi-dimensional keyboard is used as support.
Based on the multi-dimensional password, the multi-dimensional keyboard and the dynamic display technology of the multi-dimensional keyboard, the password verification method provided by the embodiment of the application can be used in any business needing password verification, the system architecture for realizing the business is shown in fig. 5, and the application scene comprises terminal equipment (101, 102, 103) used by a user and servers (120, 130) of a business provider. The terminal device and each server can communicate through a communication network, and each server can also communicate through a communication cable. The communication network may be the internet, a wireless network or a mobile communication network. The terminal device may be a mobile phone 101, a desktop computer 103, a notebook computer 102, or other terminals with mobile communication functions, such as various wearable devices. Various applications, such as a client of a bank or the like, can be installed on the terminal devices (101, 102, 103). The terminal devices (101, 102, 103) can be mobile phones or computer devices of users, and can also be various terminal devices installed by service providers, such as computers in a bank hall, ATM machines set by banks, and the like. The server in the service system can be a server, a server cluster or a cloud computing center formed by a plurality of servers (120, 130), or a virtualization platform. The password verification technology provided by the embodiment of the application is mainly used in the businesses needing to use passwords, servers in the businesses can be divided into an authentication server 120 and a business server 130 according to functions, the authentication server 120 stores a reference password set by a user through terminal equipment (101, 102 and 103), when the user requests the businesses, the passwords to be verified input by the user are verified according to the reference password, and if verification is successful, the business server 130 provides corresponding business services for the user. It should be noted that the authentication server 120 and the service server 130 may be combined. The terminal device set by the service provider for the user may also be combined with the authentication server 120 or the service server 130.
The technical scheme provided by the application mainly comprises two processes of setting a reference password and inputting a verification password for password verification by a user, and is respectively and specifically described with reference to a flow chart. The service process to be executed after the password verification is successful, according to different services, common password verification such as password verification needed during payment, password verification needed during logging in an application, and the like, the password verification technology provided by the embodiment of the application can be applied to a plurality of scenes, and various application scenes are well known to those skilled in the art and are not repeated here.
As shown in fig. 6a, fig. 6a is a process of setting a 6-bit reference password of a user on the authentication server 120 through the terminal device 103, and mainly includes the following steps:
s601, the terminal equipment 103 responds to the reference password setting operation of a user, and a multi-dimensional keyboard is displayed on a password setting interface for the first time;
before setting the reference password, the user needs to enter a password setting interface through the terminal device 103, and the terminal device 103 displays a multi-dimensional keyboard on the password setting interface according to the operation of setting the password by the user, and the password setting interface is shown in fig. 6b for example.
Step S602, a user sequentially selects key inputs on a multi-dimensional keyboard to perform first input, and presses a confirmation key after finishing the input;
the user sequentially selects keys on the multi-dimensional keyboard according to the multi-dimensional password combination mode created by the user, and the keys with the passwords correspondingly ordered are selected and displayed according to the selection sequence. According to the operation of selecting the keys by the user, prompting information such as asterisks appears in a password frame on the password setting interface every time one key is selected, so that the ordering of passwords input by the user is prompted.
In step S603, the terminal device 103 obtains the password setting information input by the user on the multi-dimensional keyboard for the first time, the password setting information input for the first time including the password set displayed by each key selected by the user and the order in which the keys are selected by the user.
Step S604, the terminal device 103 sends the password setting information input by the user for the first time to the authentication server 120;
in this embodiment, 10 different passwords are selected for each dimension, see fig. 3 c:
first dimension, digital dimension: (0-9);
second dimension, digital color dimension: (red/orange/yellow/green/cyan/blue/violet/powder/gray/black);
third dimension, graphic dimension: graphics (triangle star/square/regular pentagon/regular hexagon/octagon/dodecagram/trapezoid/heart/circle);
Fourth dimension, background color dimension: background color (red/orange/yellow/green/cyan/blue/violet/powder/gray/black), which may be identified in the graphical element.
For example, according to the multi-dimensional keyboard shown in fig. 6a, the set of passwords displayed in position 3 is as follows: number dimension 3, number color dimension purple, graphic dimension regular pentagon, background color dimension yellow. If the password selected by the user is one of the four, the key at the position 3 is selected.
Referring to fig. 3c, in order to facilitate storage and transmission of password information, in the present application, feature values are correspondingly set for each dimension of passwords, the feature values of each dimension are different from each other, the selected password set on each key can be replaced by the feature values of four different dimension passwords, and in order to more clearly identify the feature values of the multi-dimension passwords, the feature values of different dimensions can be represented by numbers or letters.
In the password setting information sent to the authentication server, the terminal device 103 displays a corresponding set of feature values on each selected key, respectively, the feature value sets being arranged in the key selection order.
Step S605, the authentication server 120 stores the password setting information received for the first time;
In step S606, the terminal device 103 displays the multi-dimensional keyboard for the second time according to the user' S confirmation key operation information.
The second displayed multi-dimensional keyboard is compared with the first displayed multi-dimensional keyboard, and the password set displayed on each key of the second time is respectively compared with the password set displayed on each key of the first time, so that at most one identical password is allowed. Such as the two displays of fig. 3a and 3 b.
Step S607, the user sequentially selects keys on the multi-dimensional keyboard to carry out the second input, and presses the confirmation key after the input is completed;
in step S608, the terminal device 103 obtains the password setting information input by the user on the multi-dimensional keyboard for the second time, where the password setting information input by the user for the second time includes the password set displayed by each key selected by the user and the order in which the keys are selected by the user.
Step S609, the terminal device 103 transmits the password setting information input by the user for the second time to the authentication server 120;
step S610, the authentication server 120 stores the password setting information received for the second time;
in step S611, the right server 120 obtains the reference password set by the user based on the password setting information of the first time and the password setting information of the second time.
The password setting information is transmitted and stored in the form of feature values, and the authentication server 120 determines intersections of feature value sets with the same order according to the first password setting information and the second password setting information, wherein only one feature value exists in each intersection, and passwords corresponding to the feature values form a reference password set by a user. In this embodiment, the reference password set by the user includes 6 passwords, and according to the order of the passwords in the reference password, the intersection of the password sets displayed by the keys in the two inputs with the same order is respectively. As the multi-dimensional keyboard displayed for the second time is at most the same as the multi-dimensional keyboard displayed for the first time, the fact that only one password is displayed in the intersection is ensured.
Step S612, if a certain intersection is empty, it is indicated that the second time of input information is wrong compared with the first time, and the prompt information of failure in setting is returned, otherwise, the prompt information of success in setting is returned.
In step S613, after receiving the prompt message of successful setting, the terminal device 103 may prompt that the setting is successful on the user setting interface, and then end the setting flow. After receiving the indication information of the setting failure, the terminal device 103 displays the indication information on the user password setting interface and prompts the user whether to reset.
Steps S607 to S611 may be executed again according to the flow, to require the user to perform the third input, where the third displayed multi-dimensional keyboard also meets at most one same dynamic display requirement as the first displayed multi-dimensional keyboard. In order to ensure the effectiveness of verification, the third-time displayed multi-dimensional keyboard is compared with the second-time displayed multi-dimensional keyboard, and the password set displayed on each key is respectively compared with the password set displayed on each key displayed on the second time, so that only one identical password is allowed at most.
The authentication server 120 obtains again the reference password set by the user according to the password setting information received for the first time and the password setting information received for the third time, compares whether the reference password is the same as the previously obtained reference password of the user, returns indication information of successful setting to the terminal device 103 if the reference password is the same as the previously obtained reference password, and returns indication information of failure setting to the terminal device 103 if the reference password is not the same as the previously obtained reference password.
The interface for successful password setting is shown in fig. 6c, and the user can directly log in the service system or select to finish.
According to the above procedure, the user may set a four-dimensional 6-bit reference password by using, for example, a four-dimensional keyboard as shown in fig. 3a, and the authentication server stores the characteristic value combination of the four-dimensional 6-bit reference password for later verification, for example, when the characteristic value combination of the four-dimensional 6-bit reference password is 3hxC J according to, for example, fig. 3c, the corresponding reference password is: number 3, number color violet, pattern trapezoid, background color powder, number 0 and background color black. The correspondence among the password dimension, password and characteristic value of the four-dimension 6-bit reference password is shown in fig. 6 e.
The design and the use method of the multi-dimensional password keyboard are basically the same as those of the traditional single-dimensional keyboard, and a touch screen input mode can be adopted, and four dimensions are taken as an example.
The key display interface of the first input is shown in fig. 3a, and the key display of the second input is shown in fig. 3b when the password is set. According to the set four-dimensional 6-bit reference password 3hxC J, when the password information is input by using the multi-dimensional keyboard shown in fig. 3, the terminal equipment records the password characteristic values input on the keys of the keyboard from the first bit to the sixth bit when the password information is input for the first time, and the password characteristic values are recorded as A1, A2, and the first to the sixth bits; and inputting the password characteristic values of the first to sixth bits on the keys of the keyboard for the second time, wherein the password characteristic values are recorded as B1, B2. The key and its password feature values of the first and second inputs are shown in fig. 6f, and the background color and the number color are described in the table shown in fig. 6 f.
And respectively comparing An and Bn (n=1, 2,.. 6), acquiring intersection sets of the An and the Bn as respectively 3, g, u, h, 0 and j of the unique same dimension passwords in the An and the Bn (n=1, 2,.. 6), and recording 3guh j as a four-dimensional 6-bit reference password input by a user.
It should be noted that, an application program of a specific service is running on the terminal device 103, and each step of processing by the terminal device 103 is that the application program is specifically executed. The terminal device 103 may also obtain the reference password set by the user and send the reference password to the authentication server 130 for saving according to the password setting information input by the user for the first time and the password setting information input by the user for the second time. Further, the terminal device 103 may further obtain the reference password set by the user again according to the password setting information input for the first time and the password setting information input for the third time, and after confirming that the password setting is successful, send the reference password set by the user to the authentication server 130 for saving. And the terminal device 103 may also store the reference password set by the user by itself, and verify the verification password input by the user according to the reference password set by the user when the user logs in the service system. Either the authentication server 130 or the terminal device 103 may store the user's reference password in a local, blockchain or cloud disk file in an encrypted manner. The procedure of modifying the reference password by the user is the same as the procedure of initially setting the reference password, and a description thereof will not be repeated.
Referring to fig. 6d, when setting the password, a selection operation of increasing the password dimension corresponding to the input operation of each reference password may be performed, so that the reference password may be set by one input. Of course, the calibration of the reference password can be added by one input. The selection operation of the password dimension can be selected and confirmed in a pull-down menu mode.
As shown in fig. 7, a flow chart of verification by using a password when a user logs in a service system mainly includes the following steps:
s701, the terminal device 103 displays a multi-dimensional keyboard on the password input interface in response to a request for inputting a password to be checked by the user.
The password entry interface is similar to the interface used in the setup process, see fig. 6 b.
Step S702, a user sequentially selects keys on a multi-dimensional keyboard to input a check password, and presses a confirmation key after inputting is completed;
in step S703, the terminal device 103 obtains password verification information input by the user on the multi-dimensional keyboard, where the password verification information includes a password set displayed by each key selected by the user and an order in which the keys are selected by the user.
Step S704, the terminal device 103 sends the password verification information input by the user to the authentication server 120;
Step S705, the authentication server 120 authenticates the server 120 to obtain the reference password set by the user according to the user identification, and verifies whether the received password verification information is correct according to the reference password of the user;
when each bit of reference password is contained in each password set sequence of the password checking information and the corresponding password sets are ordered, the password checking is correct, and the password checking is successful.
Step S706, the authentication server sends the verification result to the terminal device 103;
in step S707, the terminal apparatus 103 prompts the user for a verification result on the password input interface.
In steps 701 to 704, the terminal device 103 may display the multi-dimensional keyboard for the second time according to the confirmation key operation information of the user. The second displayed multi-dimensional keyboard has at most one identical password displayed on the same key compared with the first displayed multi-dimensional keyboard. The user sequentially selects keys on the multi-dimensional keyboard to carry out second input, and presses a confirmation key after the input is completed; the terminal device 103 obtains information input by the user on the multi-dimensional keyboard for the second time, which includes the password set displayed by each key selected by the user and the order in which the keys are selected by the user, and transmits the information to the authentication server 120.
The authentication server 120 may determine whether the verification password is correct again using the first method, and determine that the verification password is successful if both are correct. The authentication server 120 further obtains the verification password input by the user in a corresponding bit intersection manner according to the first password verification information and the second password verification information. And judging whether the verification password is the same as the reference password, if so, returning the indication information of successful verification to the terminal equipment 103, and if not, returning the indication information of failed verification to the terminal equipment 103.
In practice, the check passwords are obtained, and the check result is judged by using whether the check passwords are the same as the reference passwords or not, which is equivalent to respectively judging whether each reference password is contained in the corresponding ordered password set or not.
If the authentication server 120 cannot obtain the password to be checked input by the user according to the first password checking information and the second password checking information, a prompt message of password input error is returned. After receiving the prompt information of successful verification, the terminal device 103 may execute a subsequent service flow, and if the prompt information of failed verification or incorrect password input is received, prompt the user on the password input interface, and perform a corresponding subsequent flow according to the operation selected by the user. For example, if the user selects to end, the password input interface is closed, the verification process is ended, and if the user selects to re-input the process, the execution is resumed from step 701.
In summary, if the reference password is L bits, the password verification method specifically includes the following three steps:
firstly, according to L keys selected by a user on a multi-dimensional keyboard and a selection sequence, respectively obtaining password sets displayed on the L keys selected by the user, and arranging the password sets according to the selection sequence to form an L-bit password set sequence, wherein when each reference password in the L-bit reference passwords is contained in a password set corresponding to the ordering in the L-bit password set sequence, the verification result is successful.
Secondly, obtaining L keys and a selection sequence selected by a user on the multi-dimensional keyboard at least twice according to the L keys and the selection sequence selected by the user on the multi-dimensional keyboard; respectively obtaining corresponding L-bit password set sequences; and aiming at the L-bit password set sequence obtained each time, when each password in the L-bit reference password is contained in the password set corresponding to the ordering in each L-bit password set sequence, the verification result is successful.
Thirdly, obtaining L keys and selection sequences selected by a user on the multi-dimensional keyboard at least twice according to the L keys and the selection sequences selected by the user on the multi-dimensional keyboard, and respectively obtaining L-bit password set sequences corresponding to each time; and intersecting each set with the same order in the L-bit password set sequences obtained each time to obtain an L-bit check password input by a user, and when the L-bit check password is the same as the L-bit reference password, successfully checking the result.
The second and third modes are essentially the same.
The multidimensional password technology provided by the application can be applied to occasions such as mobile phones, computers, servers and the like where program jump and subsequent operation can be performed only by inputting password authentication identities. When the information with lower security such as the mobile phone number needs to be input or the check information needs to be displayed, the mobile phone number can be used as a single-dimension keyboard through program control. When privacy information with higher levels such as passwords is input, the keyboard can be used as a high-dimension keyboard, and has good compatibility.
And displaying the password random determination of different dimensions on each key on each multi-dimensional keyboard. In one business process, when each time is displayed, the key element set displayed on the same key at each time can only have the same password later, so that the uniqueness of the password intersection on the keys with the same ordering is ensured when information is input twice.
The method is characterized in that a specific multi-dimensional keyboard dynamic display control method is provided, so that only one password is included in the intersection of a password set displayed on any two keys in a multi-dimensional keyboard displayed each time in a business process, N keys are taken as an example of the multi-dimensional keyboard, and when the multi-dimensional keyboard is displayed each time, the password of any one dimension displayed on the N keys is kept unchanged based on the previous display; and moving at least one key to display in a mode of keeping the sequence unchanged for the passwords displayed on the keys in each dimension except any dimension, wherein the numbers of the keys correspondingly moved in each dimension are different. In the above method, the display positions of the N keys may be further rearranged.
Taking N as 10 as an example, after the user finishes the first input on the multi-dimensional keyboard displayed for the first time, during the second time, all password positions in dimension 1 (number) are kept unchanged, all password positions in dimension 2 (number color) are shifted to the right by 1 bit, all password positions in dimension 3 (pattern graph) are shifted to the right by 2 bits, all password positions in dimension 4 (background color) are shifted to the right by 3 bits, and a dynamic keyboard is generated.
Since in this example the numbers are displayed on the background color, to avoid the situation that the number color and the background are the same when each code is shifted, the code of dimension 2 (number color) and the code of dimension 4 (background color) are compared before each generation of the dynamic keyboard, and if the two are the same letters with different cases, the code positions of dimension 4 (background color) are all shifted to the right by 2 bits, and the multi-dimensional keyboard is regenerated. Of course, in order to ensure that the combination of similar colors (such as orange and yellow) does not generate the situation that the numbers are not easy to distinguish, the similar colors are respectively selected to be combined with color values with larger chromatic aberration so as to be distinguished.
When the user inputs the password to be checked, the display control method of the multi-dimensional keyboard is completely the same, and is not repeated here.
According to the password verification method provided by the application, due to the fact that the multi-dimensional password is used, the password decoding difficulty is high, and a better peeping prevention effect is obtained. The reason is that the password has dimensions M, and the password in each dimension is K (typically K >M) and the number of cipher bits is L, then when the cipher input process is completely snooped or recorded, the possible cipher combinations also have ML kinds. If the complete input process is not snooped, the possible combination of passwords is (M.times.K) L A kind of module is assembled in the module and the module is assembled in the module. In addition, the password setting process and the password input process both adopt dynamic algorithms to generate keyboard display interfaces, namely the input display interfaces are different each time, so that the password decoding difficulty is higher. Even if the password is maliciously snooped by others, the password cannot be decoded, and information leakage and property loss are avoided.
Based on the same conception, the embodiment of the application also provides a password verification device, as shown in fig. 8, mainly comprising:
a first response unit 801, configured to respond to a password input operation of a user, and obtain L keys selected by the user on a multi-dimensional keyboard and a selection sequence, where the multi-dimensional keyboard includes N keys, the multi-dimensional password includes M-dimensional passwords, each dimension includes at most K passwords, at least one password is displayed on each key, and when the multi-dimensional keyboard is displayed at least twice in succession, at most one password of the passwords displayed on any two keys is the same;
a first obtaining unit 802, configured to obtain password sets displayed on L keys selected by a user, and form an L-bit password set sequence after being arranged in a selection order, where each bit password set includes at least one check password, and both N, M, K and L are positive integers;
And a verification unit 803, configured to obtain a password verification result and perform a corresponding operation according to the password verification result, where when each reference password in the L-bit reference password is included in the password set corresponding to the sequence of the L-bit password sets, the verification result is successful, and the L-bit reference password is set by the user through the multi-dimensional keyboard in advance.
In one embodiment, the first response unit 802 is specifically further configured to obtain, at least twice, L keys and a selection sequence selected by a user on the multi-dimensional keyboard;
the first obtaining unit 801 is specifically further configured to obtain an L-bit password set sequence corresponding to each time; and
in one embodiment, the verification unit 803 is specifically further configured to verify that the result is successful when each password in the L-bit reference password is included in the corresponding password set ordered in each L-bit password set sequence.
In another embodiment, the verification unit 803 is specifically further configured to obtain, according to the L-bit password set sequence obtained by at least two inputs, an L-bit verification password input by the user, where each of the L-bit verification passwords is an intersection of corresponding password sets ordered in each of the L-bit password set sequences, and when the L-bit verification password is the same as the L-bit reference password, the verification result is successful.
For the operation of setting a reference password by a user, the verification device further comprises:
a second response unit 804, configured to respond to a reference password setting operation of the user, and display the multi-dimensional keyboard at least twice, where: at most one identical code is displayed in the multidimensional codes displayed on the same key between any two of the at least two times;
the second obtaining unit 805 is configured to obtain, according to a password setting operation performed by a user on the multi-dimensional keyboard displayed at least twice, L-bit reference passwords set by the user, where each reference password in the L-bit reference passwords is an intersection of a set of passwords displayed on keys that are ranked the same in the at least two password setting operations.
In the manner in which the user sets the reference password, the password verification apparatus further includes:
a second response unit 804, configured to respond to a reference password setting operation of the user, display a multi-dimensional keyboard, and display dimension selection information corresponding to each reference password input operation;
the second obtaining unit 805 records, as the reference password set by the user, the password of the corresponding dimension among the passwords displayed by the key selected by the user, according to the dimension information selected by the user when each bit of the reference password is input.
The first response unit 801 or the second response unit 804 is specifically configured to, during each display, keep the password of any one dimension displayed on the N keys unchanged based on the password of each dimension displayed on the N keys last time; and moving at least one key for displaying the passwords displayed on each key in each dimension except any dimension in a mode of keeping the sequence unchanged, wherein the numbers of the keys correspondingly moved in each dimension are different.
Based on the same inventive concept, the embodiment of the application also provides the computer electronic device 900. The computing device corresponds to the terminal device 103 or the authentication server 120 in the foregoing.
Referring to fig. 9, the computer electronic device 90 is in the form of a general-purpose electronic device. Components may include, but are not limited to: at least one processor 910, at least one memory 920, a bus 930 that connects the different system components, including the processor 910 and the memory 920.
Bus 930 represents one or more of several types of bus structures, including a memory bus or memory controller, a peripheral bus, a processor, and a local bus using any of a variety of bus architectures.
Memory 920 may include readable media in the form of volatile memory, such as Random Access Memory (RAM) 921 and/or cache memory 922, and may further include Read Only Memory (ROM) 923.
Memory 920 may also include a program/utility 926 having a set (at least one) of program modules 925, such program modules 925 including, but not limited to: an operating system, one or more application programs, other program modules, and program data, each or some combination of which may include an implementation of a network environment. The processor 910 is configured to execute program instructions stored in the memory 920 and the like to implement the password verification method discussed above. Processor 910 may also be used to execute program instructions stored in memory 920, etc. to implement the functions of password verification device 800 discussed above.
The computer electronic device 900 can also communicate with one or more external devices 940 (e.g., keyboard, pointing device, etc.), one or more devices that enable the terminal device to interact with the computer electronic device 900, and/or any devices (e.g., routers, modems, etc.) that enable the computer electronic device 900 to communicate with one or more other devices. Such communication may occur through an input/output (I/O) interface 950. Also, the electronic device 900 may communicate with one or more networks such as a Local Area Network (LAN), a Wide Area Network (WAN), and/or a public network such as the Internet via a network adapter 960. As shown, the network adapter 960 communicates with other modules for the electronic device 900 over the bus 930. It should be appreciated that although not shown, other hardware and/or software modules may be used in connection with the electronic device 900, including, but not limited to: microcode, device drivers, redundant processors, external disk drive arrays, RAID systems, tape drives, data backup storage systems, and the like.
Based on the same inventive concept, embodiments of the present application provide a storage medium storing computer instructions that, when executed on a computer, cause the computer to perform the password verification method discussed above.
It will be appreciated by those skilled in the art that embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, etc.) having computer-usable program feature values embodied therein.
It will be apparent to those skilled in the art that various modifications and variations can be made to the present application without departing from the spirit or scope of the application. Thus, if such modifications and variations of the present application fall within the scope of the claims and the equivalents thereof, the present application is also intended to be included therein.

Claims (12)

1. A method of password verification, comprising:
Responding to password input operation of a user, and obtaining L keys selected by the user on a multi-dimensional keyboard and a selection sequence, wherein the multi-dimensional keyboard comprises N keys, the multi-dimensional passwords comprise passwords of M dimensions, each dimension comprises at most K passwords, at least one password is displayed on each key, and when the multi-dimensional keyboard is displayed at least twice continuously, at most one password in the multi-dimensional passwords displayed on any two keys is the same;
respectively obtaining a password set displayed on each key of the L keys, and forming an L-bit password set sequence after the password sets are arranged according to the selection sequence, wherein each bit password set comprises at least one check password, and both N, M, K and L are positive integers;
and obtaining a password verification result and executing corresponding operation according to the password verification result, wherein when each reference password in the L-bit reference passwords is contained in a password set corresponding to the sequence of the L-bit password sets, the verification result is successful, and the L-bit reference passwords are preset by a user through the multidimensional keyboard.
2. The method of claim 1, wherein the L keys selected by the user on the multi-dimensional keyboard and the selection order are obtained at least twice;
Respectively obtaining corresponding L-bit password set sequences; and
and when each password in the L-bit reference passwords is contained in the password sets which are sequenced and correspond to the at least two L-bit password set sequences, the verification result is successful.
3. The method of claim 2, wherein when each of the L-bit reference passwords is included in a corresponding one of the at least two L-bit password set sequences, the verification result is successful, specifically including:
according to the L-bit password set sequence obtained by at least two inputs, an L-bit check password input by a user is obtained, each check password is an intersection of corresponding password sets sequenced in at least two L-bit password set sequences, and when the L-bit check password is identical to the L-bit reference password, the check result is successful.
4. The method of claim 1, wherein the L-bit reference password is preset by a user through the multi-dimensional keyboard, specifically comprising:
responding to the reference password setting operation of a user, and displaying the multi-dimensional keyboard at least twice, wherein: at most one identical code is displayed in the multidimensional codes displayed on the same key between any two of the at least two times;
According to the password setting operation performed by the user on the multi-dimensional keyboard displayed at least twice, obtaining L-bit reference passwords set by the user, wherein each reference password in the L-bit reference passwords is an intersection of password sets displayed on keys which are sequenced to be the same in the at least two password setting operations.
5. The method of claim 1, wherein each dimension includes N passwords, each time the multi-dimensional keyboard is displayed, the respective passwords for each dimension are displayed on different keys, M is less than or equal to N, K is less than or equal to N.
6. The method of claim 5, wherein the L-bit reference password is preset by a user through the multi-dimensional keyboard, specifically comprising:
responding to the reference password setting operation of a user, displaying the multi-dimensional keyboard, and displaying dimension selection information corresponding to each reference password input operation;
and recording the corresponding dimension password in the passwords displayed by the keys selected by the user as the reference password set by the user according to the dimension information selected by the user when the user inputs each bit of reference password.
7. The method of claim 5, wherein N is equal to 10, wherein the M dimensions comprise a number dimension, wherein the number dimension comprises 10 numbers, and wherein the 10 numbers are integers greater than or equal to 0 and less than or equal to 9.
8. The method according to any one of claims 1 to 7, wherein at most one of the multi-dimensional passwords displayed on any two keys is the same when the multi-dimensional keyboard is displayed each time, specifically comprising:
when each time of display, based on the passwords of each dimension displayed on the N keys at the last time, keeping the password of any dimension displayed on the N keys unchanged;
and moving at least one key for displaying in a mode of keeping the ordering unchanged for the passwords displayed on each key in each dimension except any dimension, wherein the numbers of the keys correspondingly moved in each dimension are different.
9. The method of claim 8, wherein each time displayed, further comprising: the display positions of the N keys are rearranged.
10. A password verification apparatus, comprising:
the first response unit is used for responding to the password input operation of a user and obtaining L keys selected by the user on the multi-dimensional keyboard and a selection sequence, wherein the multi-dimensional keyboard comprises N keys, the multi-dimensional password comprises M-dimensional passwords, each dimension comprises at most K passwords, at least one password is displayed on each key, and when the multi-dimensional keyboard is displayed at least twice continuously, at most one password in the multi-dimensional passwords displayed on any two keys is the same;
The first obtaining unit is used for respectively obtaining a password set displayed on each key of the L keys, and forming an L-bit password set sequence after being arranged according to the selection sequence, wherein each bit password set comprises at least one check password, and the N, M, K and the L are positive integers;
and the verification unit is used for obtaining a password verification result and executing corresponding operation according to the password verification result, wherein when each reference password in the L-bit reference passwords is contained in the password set corresponding to the ordering in the L-bit password set sequence, the verification result is successful, and the L-bit reference passwords are preset by a user through the multidimensional keyboard.
11. A computer readable storage medium storing computer instructions which, when executed by a processor, implement the cryptographic verification method of any one of claims 1-9.
12. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the processor implements the steps of the method of any of claims 1-9 when the program is executed by the processor.
CN202010235535.2A 2020-03-30 2020-03-30 Password verification method and device, storage medium and electronic equipment Active CN111460536B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010235535.2A CN111460536B (en) 2020-03-30 2020-03-30 Password verification method and device, storage medium and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010235535.2A CN111460536B (en) 2020-03-30 2020-03-30 Password verification method and device, storage medium and electronic equipment

Publications (2)

Publication Number Publication Date
CN111460536A CN111460536A (en) 2020-07-28
CN111460536B true CN111460536B (en) 2023-11-17

Family

ID=71679242

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010235535.2A Active CN111460536B (en) 2020-03-30 2020-03-30 Password verification method and device, storage medium and electronic equipment

Country Status (1)

Country Link
CN (1) CN111460536B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112099719A (en) * 2020-09-11 2020-12-18 邹寿飞 Input method, device and computer storage medium
CN112347454A (en) * 2020-11-06 2021-02-09 上海悦易网络信息技术有限公司 Verification information generation method and device
CN113111318A (en) * 2021-03-29 2021-07-13 盛林妹 Authentication method, equipment for realizing authentication and intelligent lock

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102375944A (en) * 2010-08-18 2012-03-14 启碁科技股份有限公司 Handheld device with password authentication function and system applying the same
CN103677304A (en) * 2013-12-20 2014-03-26 施韧 Chinese character Pinyin input method with initial-final partition areas
WO2014117430A1 (en) * 2013-02-04 2014-08-07 快车科技有限公司 Security password protection method and related device
CN108154055A (en) * 2018-01-10 2018-06-12 上海展扬通信技术有限公司 Cipher-code input method, mobile terminal and storage medium
CN108388789A (en) * 2018-05-01 2018-08-10 于君 Icon formula cipher authentication method and device with random character segment mark

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9146669B2 (en) * 2009-12-29 2015-09-29 Bizmodeline Co., Ltd. Password processing method and apparatus

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102375944A (en) * 2010-08-18 2012-03-14 启碁科技股份有限公司 Handheld device with password authentication function and system applying the same
WO2014117430A1 (en) * 2013-02-04 2014-08-07 快车科技有限公司 Security password protection method and related device
CN103677304A (en) * 2013-12-20 2014-03-26 施韧 Chinese character Pinyin input method with initial-final partition areas
CN108154055A (en) * 2018-01-10 2018-06-12 上海展扬通信技术有限公司 Cipher-code input method, mobile terminal and storage medium
CN108388789A (en) * 2018-05-01 2018-08-10 于君 Icon formula cipher authentication method and device with random character segment mark

Also Published As

Publication number Publication date
CN111460536A (en) 2020-07-28

Similar Documents

Publication Publication Date Title
CN111460536B (en) Password verification method and device, storage medium and electronic equipment
CN100361115C (en) Method and system for processing password inputted by the matching of cells
US5664099A (en) Method and apparatus for establishing a protected channel between a user and a computer system
US11599624B2 (en) Graphic pattern-based passcode generation and authentication
US20060206919A1 (en) System and method of secure login on insecure systems
US20190260747A1 (en) Securing a transaction performed from a non-secure terminal
US6178508B1 (en) System for controlling access to encrypted data files by a plurality of users
CN109416722B (en) Secure collection of sensitive data
US11128613B2 (en) Authentication based on visual memory
US11468157B2 (en) Method for authenticating a user by user identifier and associated graphical password
US11604867B2 (en) Graphic pattern-based authentication with adjustable challenge level
WO2014085816A1 (en) Observable authentication methods and apparatus
CN108868367A (en) intelligent lock device
WO2011124267A1 (en) Authentication system and method thereof
EP3319067B1 (en) Method for authenticating a user by means of a non-secure terminal
EP3319000A1 (en) Method for securing a transaction performed from a non-secure terminal
EP3594838A1 (en) Method for recovering a secret key securely stored in a secure element
US20230057862A1 (en) Fraud resistant passcode entry system
EP3319068A1 (en) Method for securely transmitting a secret data to a user of a terminal
EP3319269A1 (en) Method for securely performing a sensitive operation using a non-secure terminal
Thomas et al. Color Scheme Password Encryption & Storage

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant